CS 290 Host-based Security and Malware. Christopher Kruegel

Size: px
Start display at page:

Download "CS 290 Host-based Security and Malware. Christopher Kruegel [email protected]"

Transcription

1 CS 290 Host-based Security and Malware Christopher Kruegel

2 Unix

3 Unix / Linux Started in 1969 at AT&T / Bell Labs Split into a number of popular branches BSD, Solaris, HP-UX, AIX Inspired a number of Unix-like systems Linux, Minix Standardization attempts POSIX, Single Unix Specification (SUS), Filesystem Hierarchy Standard (FHS), Linux Standard Base (LSB), ELF 3

4 Unix Kernel vulnerability usually leads to complete system compromise attacks performed via system calls Solaris / NetBSD call gate creation input validation problem malicious input when creating a LDT (x86 local descriptor table) used in 2001 by Last Stage of Delirium to win Argus Pitbull Competition Kernel Integer Overflows FreeBSD procfs code (September 2003) Linux brk() used to compromise debian.org (December 2003) Linux setsockopt() (May 2004) Linux Memory Management mremap() and munmap() (March 2004) 4

5 Unix More recent Linux vulnerabilities Linux message interface (August 2005, CAN ) race condition - proc and prctl (July 2006, CVE ) local privilege escalation - (September 2007, CVE ) security bypass and DoS (May 2008, CVE , CVE ) Device driver code is particularly vulnerable (most) drivers run in kernel mode, either kernel modules or compiled-in often not well audited very large code based compared to core services Examples aironet, asus_acpi, decnet, mpu401, msnd, and pss (2004) found by sparse (tool developed by Linus Torvalds) remote root (MadWifi , Broadcom ) 5

6 Unix Code running in user mode is always linked to a certain identity security checks and access control decisions are based on user identity Unix is user-centric no roles User identified by user name (UID), group name (GID) typically authenticated by password (stored encrypted) User root superuser, system administrator special privileges (access resources, modify OS) cannot decrypt user passwords 6

7 Process Management Process implements user-activity entity that executes a given piece of code has its own execution stack, memory pages, and file descriptors table separated from other processes using the virtual memory abstraction Thread separate stack and program counter share memory pages and file descriptor table 7

8 Process Management Process Attributes process ID (PID) uniquely identified process (real) user ID (UID) ID of owner of process effective user ID (EUID) ID used for permission checks (e.g., to access resources) saved user ID (SUID) to temporarily drop and restore privileges lots of management information scheduling memory management, resource management 8

9 Process Management Switching between IDs uid-setting system calls int setuid(uid_t uid) int seteuid(uid_t uid) int setresuid(uid_t ruid, uid_t euid, uid_t suid) Can be tricky POSIX : If the process has appropriate privileges, the setuid(newuid) function sets the real user ID, effective user ID, and the [saved user ID] to newuid. what are appropriate privileges? Solaris: EUID = 0; FreeBSD: newuid = EUID; Linux: SETUID capability 9

10 Process Management Bug in sendmail : call to setuid(getuid()) to clear privileges (effective UID is root) on Linux, attacker could clear SETUID capability call clears EUID, but SUID remains root Further reading Setuid Demystified Hao Chen, David Wagner, and Drew Dean 11th USENIX Security Symposium,

11 User Authentication How does a process get a user ID? Authentication Passwords user passwords are used as keys for crypt() function runs DES algorithm 25 times on a block of zeros 12-bit salt 4096 variations chosen from date, not secret prevent same passwords to map onto same string make dictionary attacks more difficult Password cracking dictionary attacks, rainbow tables Crack, JohnTheRipper 11

12 User Authentication Shadow passwords password file is needed by many applications to map user ID to user names encrypted passwords are not /etc/shadow holds encrypted passwords account information last change date expiration (warning, disabled) minimum change frequency readable only by superuser and privileged programs MD5 hashed passwords (default) to slow down guessing 12

13 User Authentication Shadow passwords a number of other encryption / hashing algorithms were proposed blowfish, SHA-1, Other authentication means possible Linux PAM (pluggable authentication modules) Kerberos Active directory (Windows) 13

14 Group Model Users belong to one or more groups primary group (stored in /etc/password) additional groups (stored in /etc/group) possibility to set group password and become group member with newgrp /etc/group groupname : password : group id : additional users root:x:0:root bin:x:1:root,bin,daemon users:x:100:chris Special group wheel protect root account by limiting user accounts that can perform su 14

15 File System File tree primary repository of information hierarchical set of directories directories contain file system objects (FSO) root is denoted / File system object files, directories, symbolic links, sockets, device files referenced by inode (index node) 15

16 File System Access Control permission bits chmod, chown, chgrp, umask file listing: - rwx rwx rwx (file type) (user) (group) (other) Type r w x s t File read access write access execute suid / sgid inherit id sticky bit Directory list files insert and remove files stat / execute files, chdir new files have dir-gid files only deleteable by owner 16

17 SUID Programs Each process has real and effective user / group ID usually identical real IDs determined by current user authentication (login, su) effective IDs determine the rights of a process system calls (e.g., setuid()) suid / sgid bits to start process with effective ID different from real ID attractive target for attacker Never use SUID shell scripts (multiplying problems) 17

18 File System Shared resource susceptible to race condition problems Time-of-Check, Time-of-Use (TOCTOU) common race condition problem problem: Time-Of-Check (t 1 ): validity of assumption A on entity E is checked Time-Of-Use (t 2 ): assuming A is still valid, E is used Time-Of-Attack (t 3 ): assumption A is invalidated t 1 < t 3 < t 2 18

19 TOCTOU Steps to access a resource 1. obtain reference to resource 2. query resource to obtain characteristics 3. analyze query results 4. if resource is fit, access it Often occurs in Unix file system accesses check permissions for a certain file name (e.g., using access(2)) open the file, using the file name (e.g., using fopen(3)) four levels of indirection (symbolic link - hard link - inode - file descriptor) Windows uses file handles and includes checks in API open call 19

20 Overview Case study /* access returns 0 on success */ if(!access(file, W_OK)) { f = fopen(file, "wb+"); write_to_file(f); } else { fprintf(stderr, "Permission denied when trying to open %s.\n", file); } Attack $ touch dummy; ln s dummy pointer $ rm pointer; ln s /etc/passwd pointer 20

21 Examples TOCTOU Examples Filename Redirection Setuid Scripts 1. exec() system call invokes seteuid() call prior to executing program 2. program is a script, so command interpreter is loaded first 3. program interpreted (with root privileges) is invoked on script name 4. attacker can replace script content between step 2 and 3 21

22 Examples TOCTOU Examples Directory operations rm can remove directory trees, traverses directories depth-first issues chdir(.. ) to go one level up after removing a directory branch by relocating subdirectory to another directory, arbitrary files can be deleted Temporary files commonly opened in /tmp or /var/tmp often guessable file names 22

23 Temporary Files Secure procedure for creating temporary files 1. pick a prefix for your filename 2. generate at least 64 bits of high-quality randomness 3. base64 encode the random bits 4. concatenate the prefix with the encoded random data 5. set umask appropriately (0066 is usually good) 6. use fopen(3) to create the file, opening it in the proper mode 7. delete the file immediately using unlink(2) 8. perform reads, writes, and seeks on the file as necessary 9. finally, close the file 23

24 Temporary Files Library functions to create temporary files can be insecure mktemp(3) is not secure, use mkstemp(3) instead old versions of mkstemp(3) did not set umask correctly Temp Cleaners programs that clean old temporary files from temp directories first lstat(2) file, then use unlink(2) to remove files vulnerable to race condition when attacker replaces file between lstat(2) and unlink(2) arbitrary files can be removed delay program long enough until temp cleaner removes active file 24

25 Prevention Handbook of Information Security Management suggests 1. increase number of checks 2. move checks closer to point of use 3. immutable bindings Only number 3 is acceptable! Immutable bindings operate on file descriptors do not check access by yourself (i.e., no use of access(2)) drop privileges instead and let the file system do the job Use the O_CREAT O_EXCL flags to create a new file with open(2) and be prepared to have the open call fail 25

26 Prevention Series of papers on the access system call Fixing races for fun and profit: how to use access(2) D. Dean and A. Hu Usenix Security Symposium, 2004 Fixing races for fun and profit: howto abuse atime N. Borisov, R. Johnson, N. Sastry, and D. Wagner Usenix Security Symposium, 2005 Portably Solving File TOCTTOU Races with Hardness Amplification D. Tsafrir, T. Hertz, D. Wagner, and D.Da Silva Usenix Conference on File and Storage Technologies (FAST),

27 Prevention Series of papers on the access system call Fixing races for fun and profit: howto use access(2) K-race [ do multiple access and open calls, and check that open always opens the same file ] Fixing races for fun and profit: howto abuse atime File system maze [ make very long directory paths, ensuring that it takes long time between each open and access call ] Portably Solving File TOCTTOU Races with Hardness Amplification Fix to k-race [ check each part of the path with a K-race ] 27

28 Locking Ensures exclusive access to a certain resource Used to circumvent accidental race conditions advisory locking (processes need to cooperate) not mandatory, therefore not secure Often, files are used for locking portable (files can be created nearly everywhere) stuck locks can be easily removed Simple method open file using the O_EXCL flag 28

29 Shell Shell one of the core Unix application both a command language and programming language provides an interface to the Unix operating system rich features such as control-flow primitives, parameter passing, variables, and string substitution communication between shell and spawned programs via redirection and pipes different flavors bash and sh, tcsh and csh, ksh 29

30 Shell Attacks Environment Variables $HOME and $PATH can modify behavior of programs that operate with relative path names $IFS internal field separator used to parse tokens usually set to [ \t\n] but can be changed to / /bin/ls is parsed as bin ls calling bin locally IFS now only used to split expanded variables preserve attack (/usr/lib/preserve is SUID) called /bin/mail when vi crashes to preserve file change IFS, create bin as link to /bin/sh, kill vi 30

31 Shell Attacks Control and escape characters can be injected into command string modify or extend shell behavior user input used for shell commands has to be rigorously sanitized easy to make mistakes classic examples are `; and `& Applications that are invoked via shell can be targets as well increased vulnerability surface Restricted shell invoked with -r more controlled environment 31

32 Shell Attacks system(char *cmd) function called by programs to execute other commands invokes shell executes string argument by calling /bin/sh c string makes binary program vulnerable to shell attacks especially when user input is utilized popen(char *cmd, char *type) forks a process, opens a pipe and invokes shell for cmd 32

33 File Descriptor Attacks SUID program opens file forks external process sometimes under user control on-execute flag if close-on-exec flag is not set, then new process inherits file descriptor launch program works exactly like this malicious attacker might exploit such weakness Linux Perl getpwuid() leaves /etc/shadow opened (June 2002) problem for Apache with mod_perl 33

34 Resource Limits File system limits quotas restrict number of storage blocks and number of inodes hard limit can never be exceeded (operation fails) soft limit can be exceeded temporarily can be defined per mount-point defend against resource exhaustion (denial of service) Process resource limits number of child processes, open file descriptors 34

35 Signals Signal simple form of interrupt asynchronous notification can happen anywhere for process in user space used to deliver segmentation faults, reload commands, kill command Signal handling process can install signal handlers when no handler is present, default behavior is used ignore or kill process possible to catch all signals except SIGKILL (-9) 35

36 Signals Security issues code has to be be re-entrant atomic modifications no global data structures race conditions unsafe library calls, system calls examples wu-ftpd 2001, sendmail , stunnel 2003, ssh 2006 Secure signals write handler as simple as possible block signals in handler 36

37 Shared Libraries Library collection of object files included into (linked) program as needed code reuse Shared library multiple processes share a single library copy save disk space (program size is reduced) save memory space (only a single copy in memory) used by virtually all Unix applications (at least libc.so) check binaries with ldd 37

38 Shared Libraries Static shared library address binding at link-time not very flexible when library changes code is fast Dynamic shared library address binding at load-time uses procedure linkage table (PLT) and global offset table (GOT) code is slower (indirection) loading is slow (binding has to be done at run-time) classic.so or.dll libraries PLT and GOT entries are very popular attack targets more when discussing buffer overflows 38

39 Shared Libraries Management stored in special directories (listed in /etc/ld.so.conf) manage cache with ldconfig Preload override (substitute) with other version use /etc/ld.so.preload can also use environment variables for override possible security hazard now disabled for SUID programs (old Solaris vulnerability) 39

40 Advanced Security Features Address space protection address space layout randomization (ASLR) non-executable stack (based on NX bit or PAX patches) Mandatory access control extensions SELinux role-based access control extensions capability support Miscellaneous improvements hardened chroot jails better auditing 40

Unix Security Features and TCP/IP Primer

Unix Security Features and TCP/IP Primer Unix Security Features and TCP/IP Primer Secure Software Programming and Vulnerability Analysis Christopher Kruegel Unix Security Features and TCP/IP Primer Secure Software Programming 2 Unix Features

More information

CIS 551 / TCOM 401 Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 3 1/18/07 CIS/TCOM 551 1 Announcements Email project groups to Jeff (vaughan2 AT seas.upenn.edu) by Jan. 25 Start your projects early!

More information

System Security Fundamentals

System Security Fundamentals System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview

More information

Set-UID Privileged Programs

Set-UID Privileged Programs Lecture Notes (Syracuse University) Set-UID Privileged Programs: 1 Set-UID Privileged Programs The main focus of this lecture is to discuss privileged programs, why they are needed, how they work, and

More information

Chapter 7: Unix Security. Chapter 7: 1

Chapter 7: Unix Security. Chapter 7: 1 Chapter 7: Unix Security Chapter 7: 1 Objectives Understand the security features provided by a typical operating system. Introduce the basic Unix security model. See how general security principles are

More information

CIS433/533 - Computer and Network Security Operating System Security

CIS433/533 - Computer and Network Security Operating System Security CIS433/533 - Computer and Network Security Operating System Security Professor Kevin Butler Winter 2010 Computer and Information Science OS Security An secure OS should provide (at least) the following

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4

CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4 CIS 551 / TCOM 401 Computer and Network Security Spring 2005 Lecture 4 Access Control: The Big Picture Objects - resources being protected E.g. files, devices, etc. Subjects - active entities E.g. processes,

More information

Safety measures in Linux

Safety measures in Linux S a f e t y m e a s u r e s i n L i n u x Safety measures in Linux Krzysztof Lichota [email protected] A g e n d a Standard Unix security measures: permissions, capabilities, ACLs, chroot Linux kernel

More information

CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006 CSE331: Introduction to Networks and Security Lecture 34 Fall 2006 Announcements Problem with Crypto.java Look for a new Crypto.java file later today Project 4 is due Dec. 8th at midnight. Homework 3 is

More information

Programmation Systèmes Cours 4 Runtime user management

Programmation Systèmes Cours 4 Runtime user management Programmation Systèmes Cours 4 Runtime user management Stefano Zacchiroli [email protected] Laboratoire PPS, Université Paris Diderot - Paris 7 20 Octobre 2011 URL http://upsilon.cc/zack/teaching/1112/progsyst/

More information

1. Introduction to the UNIX File System: logical vision

1. Introduction to the UNIX File System: logical vision Unix File System 1. Introduction to the UNIX File System: logical vision Silberschatz, Galvin and Gagne 2005 Operating System Concepts 7 th Edition, Feb 6, 2005 Logical structure in each FS (System V):

More information

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in

More information

Case Studies. Joint software development Mail 1 / 38. Case Studies Joint Software Development. Mailers

Case Studies. Joint software development Mail 1 / 38. Case Studies Joint Software Development. Mailers Joint software development Mail 1 / 38 Situations Roles Permissions Why Enforce Access Controls? Unix Setup Windows ACL Setup Reviewer/Tester Access Medium-Size Group Basic Structure Version Control Systems

More information

Secure computing: SELinux

Secure computing: SELinux Secure computing: SELinux Michael Wikberg Helsinki University of Technology [email protected] Abstract Using mandatory access control greatly increases the security of an operating system. SELinux,

More information

Capability-Based Access Control

Capability-Based Access Control Lecture Notes (Syracuse University) Capability: 1 Capability-Based Access Control 1 An Analogy: Bank Analogy We would like to use an example to illustrate the need for capabilities. In the following bank

More information

Defense in Depth: Protecting Against Zero-Day Attacks

Defense in Depth: Protecting Against Zero-Day Attacks Defense in Depth: Protecting Against Zero-Day Attacks Chris McNab FIRST 16, Budapest 2004 Agenda Exploits through the ages Discussion of stack and heap overflows Common attack behavior Defense in depth

More information

Distributed File Systems Part I. Issues in Centralized File Systems

Distributed File Systems Part I. Issues in Centralized File Systems Distributed File Systems Part I Daniel A. Menascé File Naming Issues in Centralized File Systems c:\courses\cs571\procs.ps (MS-DOS) /usr/menasce/courses/cs571/processes.ps (UNIX) File Structure bitstream

More information

static void insecure (localhost *unix)

static void insecure (localhost *unix) static void insecure (localhost *unix) Eric Pancer [email protected] Information Security Team DePaul University http://infosec.depaul.edu Securing UNIX Hosts from Local Attack p.1/32 Overview

More information

Unix Security Technologies: Host Security Tools. Peter Markowsky <peterm[at]ccs.neu.edu>

Unix Security Technologies: Host Security Tools. Peter Markowsky <peterm[at]ccs.neu.edu> Unix Security Technologies: Host Security Tools Peter Markowsky Syllabus An Answer to last week s assignment Four tools SSP W^X PaX Systrace Last time You were assigned to get a

More information

Case Study: Access control 1 / 39

Case Study: Access control 1 / 39 Case Study: Access control 1 / 39 Joint software development Mail 2 / 39 Situations Roles Permissions Why Enforce Access Controls? Classic Unix Setup ACL Setup Reviewer/Tester Access Medium-Size Group

More information

Red Hat Linux Internals

Red Hat Linux Internals Red Hat Linux Internals Learn how the Linux kernel functions and start developing modules. Red Hat Linux internals teaches you all the fundamental requirements necessary to understand and start developing

More information

Features. The Samhain HIDS. Overview of available features. Rainer Wichmann

Features. The Samhain HIDS. Overview of available features. Rainer Wichmann Overview of available features November 1, 2011 POSIX (e.g. Linux, *BSD, Solaris 2.x, AIX 5.x, HP-UX 11, and Mac OS X. Windows 2000 / WindowsXP with POSIX emulation (e.g. Cygwin). Please note that this

More information

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform

More information

LSN 10 Linux Overview

LSN 10 Linux Overview LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced

More information

CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS [email protected]

CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS mdahshan@ccis.ksu.edu.sa CEN 559 Selected Topics in Computer Engineering Dr. Mostafa H. Dahshan KSU CCIS [email protected] Access Control Access Control Which principals have access to which resources files they can read

More information

CSE 265: System and Network Administration. CSE 265: System and Network Administration

CSE 265: System and Network Administration. CSE 265: System and Network Administration CSE 265: System and Network Administration MW 9:10-10:00am Packard 258 F 9:10-11:00am Packard 112 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor:

More information

Plan 9 Authentication in Linux

Plan 9 Authentication in Linux Plan 9 Authentication in Linux Ashwin Ganti University of Illinois at Chicago [email protected] ABSTRACT This paper talks about the implementation of the Plan 9 authentication mechanisms for Linux. As

More information

CSE543 - Introduction to Computer and Network Security. Module: Operating System Security

CSE543 - Introduction to Computer and Network Security. Module: Operating System Security CSE543 - Introduction to Computer and Network Security Module: Operating System Security Professor Trent Jaeger 1 OS Security So, you have built an operating system that enables user-space processes to

More information

CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor

CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor CSE543 - Introduction to Computer and Network Security Module: Reference Monitor Professor Trent Jaeger 1 Living with Vulnerabilities So, software is potentially vulnerable In a variety of ways So, how

More information

Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/

Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security 0 to full speed No protection system in early versions

More information

Summary of the SEED Labs For Authors and Publishers

Summary of the SEED Labs For Authors and Publishers SEED Document 1 Summary of the SEED Labs For Authors and Publishers Wenliang Du, Syracuse University To help authors reference our SEED labs in their textbooks, we have created this document, which provides

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Incremental Backup Script. Jason Healy, Director of Networks and Systems

Incremental Backup Script. Jason Healy, Director of Networks and Systems Incremental Backup Script Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Incremental Backup Script 5 1.1 Introduction.............................. 5 1.2 Design Issues.............................

More information

Operating System Structure

Operating System Structure Operating System Structure Lecture 3 Disclaimer: some slides are adopted from the book authors slides with permission Recap Computer architecture CPU, memory, disk, I/O devices Memory hierarchy Architectural

More information

COS 318: Operating Systems. File Layout and Directories. Topics. File System Components. Steps to Open A File

COS 318: Operating Systems. File Layout and Directories. Topics. File System Components. Steps to Open A File Topics COS 318: Operating Systems File Layout and Directories File system structure Disk allocation and i-nodes Directory and link implementations Physical layout for performance 2 File System Components

More information

Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>

Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu> Unix Security Technologies Pete Markowsky What is this about? The goal of this CPU/SWS are: Introduce you to classic vulnerabilities Get you to understand security advisories Make

More information

How To Fix A Snare Server On A Linux Server On An Ubuntu 4.5.2 (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking

How To Fix A Snare Server On A Linux Server On An Ubuntu 4.5.2 (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking Snare System Version 6.3.5 Release Notes is pleased to announce the release of Snare Server Version 6.3.5. Snare Server Version 6.3.5 Bug Fixes: The Agent configuration retrieval functionality within the

More information

TELE 301 Lecture 7: Linux/Unix file

TELE 301 Lecture 7: Linux/Unix file Overview Last Lecture Scripting This Lecture Linux/Unix file system Next Lecture System installation Sources Installation and Getting Started Guide Linux System Administrators Guide Chapter 6 in Principles

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

HP-UX Essentials and Shell Programming Course Summary

HP-UX Essentials and Shell Programming Course Summary Contact Us: (616) 875-4060 HP-UX Essentials and Shell Programming Course Summary Length: 5 Days Prerequisite: Basic computer skills Recommendation Statement: Student should be able to use a computer monitor,

More information

Access Control Lists in Linux & Windows

Access Control Lists in Linux & Windows Access Control Lists in Linux & Windows Vasudevan Nagendra & Yaohui Chen Categorization: Access Control Mechanisms Discretionary Access Control (DAC): Owner of object specifies who can access object (files/directories)

More information

6.828 Operating System Engineering: Fall 2003. Quiz II Solutions THIS IS AN OPEN BOOK, OPEN NOTES QUIZ.

6.828 Operating System Engineering: Fall 2003. Quiz II Solutions THIS IS AN OPEN BOOK, OPEN NOTES QUIZ. Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.828 Operating System Engineering: Fall 2003 Quiz II Solutions All problems are open-ended questions. In

More information

Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current

More information

Snare System Version 6.3.6 Release Notes

Snare System Version 6.3.6 Release Notes Snare System Version 6.3.6 Release Notes is pleased to announce the release of Snare Server Version 6.3.6. Snare Server Version 6.3.6 New Features Added objective and user documentation to the email header,

More information

Operating System Components and Services

Operating System Components and Services Operating System Components and Services Tom Kelliher, CS 311 Feb. 6, 2012 Announcements: From last time: 1. System architecture issues. 2. I/O programming. 3. Memory hierarchy. 4. Hardware protection.

More information

issh v. Auditd: Intrusion Detection in High Performance Computing

issh v. Auditd: Intrusion Detection in High Performance Computing issh v. Auditd: Intrusion Detection in High Performance Computing Computer System, Cluster, and Networking Summer Institute David Karns, New Mexico State University Katy Protin, The University of North

More information

SEED: A Suite of Instructional Laboratories for Computer SEcurity EDucation

SEED: A Suite of Instructional Laboratories for Computer SEcurity EDucation SEED: A Suite of Instructional Laboratories for Computer SEcurity EDucation Wenliang Du, Zhouxuan Teng, and Ronghua Wang Department of Electrical Engineering and Computer Science Syracuse University. Syracuse,

More information

Chapter 6, The Operating System Machine Level

Chapter 6, The Operating System Machine Level Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General

More information

Confining the Apache Web Server with Security-Enhanced Linux

Confining the Apache Web Server with Security-Enhanced Linux Confining the Apache Web Server with Security-Enhanced Linux Michelle J. Gosselin, Jennifer Schommer [email protected], [email protected] Keywords: Operating System Security, Web Server Security, Access

More information

Lab 2 : Basic File Server. Introduction

Lab 2 : Basic File Server. Introduction Lab 2 : Basic File Server Introduction In this lab, you will start your file system implementation by getting the following FUSE operations to work: CREATE/MKNOD, LOOKUP, and READDIR SETATTR, WRITE and

More information

Software security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security

Software security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security Software security Buffer overflow attacks SQL injections Lecture 11 EIT060 Computer Security Buffer overflow attacks Buffer overrun is another common term Definition A condition at an interface under which

More information

Nixu SNS Security White Paper May 2007 Version 1.2

Nixu SNS Security White Paper May 2007 Version 1.2 1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle

More information

Practical Mac OS X Insecurity. Security Concepts, Problems and Exploits on your Mac

Practical Mac OS X Insecurity. Security Concepts, Problems and Exploits on your Mac Practical Mac OS X Insecurity Security Concepts, Problems and Exploits on your Mac Who am I? Student of physics, mathematics and astronomy in Bonn Mac user since 1995 I love Macs Mac evangelist Intentions

More information

CS161: Operating Systems

CS161: Operating Systems CS161: Operating Systems Matt Welsh [email protected] Lecture 2: OS Structure and System Calls February 6, 2007 1 Lecture Overview Protection Boundaries and Privilege Levels What makes the kernel different

More information

SCP - Strategic Infrastructure Security

SCP - Strategic Infrastructure Security SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character

More information

CSE 265: System and Network Administration. CSE 265: System and Network Administration

CSE 265: System and Network Administration. CSE 265: System and Network Administration CSE 265: System and Network Administration WF 9:10-10:00am Packard 258 M 9:10-11:00am Packard 112 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor:

More information

How to Sandbox IIS Automatically without 0 False Positive and Negative

How to Sandbox IIS Automatically without 0 False Positive and Negative How to Sandbox IIS Automatically without 0 False Positive and Negative Professor Tzi-cker Chiueh Computer Science Department Stony Brook University [email protected] 2/8/06 Blackhat Federal 2006 1 Big

More information

Homeland Security Red Teaming

Homeland Security Red Teaming Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing

More information

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts

More information

The Case for SE Android. Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency

The Case for SE Android. Stephen Smalley sds@tycho.nsa.gov Trust Mechanisms (R2X) National Security Agency The Case for SE Android Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency 1 Android: What is it? Linux-based software stack for mobile devices. Very divergent from typical

More information

File Systems Management and Examples

File Systems Management and Examples File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size

More information

Secure Shell Demon setup under Windows XP / Windows Server 2003

Secure Shell Demon setup under Windows XP / Windows Server 2003 Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}

More information

Running a Default Vulnerability Scan

Running a Default Vulnerability Scan Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s integrated vulnerability

More information

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006 CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your

More information

Traditional Rootkits Lrk4 & KNARK

Traditional Rootkits Lrk4 & KNARK Traditional Rootkits Lrk4 & KNARK Based on a paper by John Levine & Julian Grizzard http://users.ece.gatech.edu/~owen/research/conference%20publications/rookit_southeastcon2003.pdf ECE 4883 Internetwork

More information

CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure

CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure CSE 120 Principles of Operating Systems Fall 2000 Lecture 3: Operating System Modules, Interfaces, and Structure Geoffrey M. Voelker Modules, Interfaces, Structure We roughly defined an OS as the layer

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Chapter 12 File Management. Roadmap

Chapter 12 File Management. Roadmap Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Overview Roadmap File organisation and Access

More information

What is Web Security? Motivation

What is Web Security? Motivation [email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

Chapter 12 File Management

Chapter 12 File Management Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access

More information

I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation. Mathias Payer, ETH Zurich

I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation. Mathias Payer, ETH Zurich I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation Mathias Payer, ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application

More information

Audit Trail Administration

Audit Trail Administration Audit Trail Administration 0890431-030 August 2003 Copyright 2003 by Concurrent Computer Corporation. All rights reserved. This publication or any part thereof is intended for use with Concurrent Computer

More information

Running a Default Vulnerability Scan SAINTcorporation.com

Running a Default Vulnerability Scan SAINTcorporation.com SAINT Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Install SAINT Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

File System Encryption with Integrated User Management

File System Encryption with Integrated User Management File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich [email protected] Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of

More information

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not

More information

Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.

Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security

More information

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2 Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22

More information

What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team

What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information

More information

Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers

Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers Seyed Ali Mirheidari 1, Sajjad Arshad 2, Saeidreza Khoshkdahan 3, Rasool Jalili 4 1 Computer Engineering Department, Sharif

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration MW 1:10-2:00pm Maginnes 105 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor: Prof. Brian D. Davison

More information

Practical Mac OS X Insecurity

Practical Mac OS X Insecurity Practical Mac OS X Insecurity Security Concepts, Problems, and Exploits on Your Mac Angelo Laub [email protected] December 11, 2004 1 Introduction While rumors have it that Mac OS X is extremely secure

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Chapter 14: Access Control Mechanisms

Chapter 14: Access Control Mechanisms Chapter 14: Access Control Mechanisms Access control lists Capabilities Locks and keys Ring-based access control Propagated access control lists Slide #14-1 Overview Access control lists Capability lists

More information

Ingres 9.3. Security Guide ING-93-SG-02

Ingres 9.3. Security Guide ING-93-SG-02 Ingres 9.3 Security Guide ING-93-SG-02 This Documentation is for the end user's informational purposes only and may be subject to change or withdrawal by Ingres Corporation ("Ingres") at any time. This

More information

Unix Sampler. PEOPLE whoami id who

Unix Sampler. PEOPLE whoami id who Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host

More information

Unix/Linux Forensics 1

Unix/Linux Forensics 1 Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

Computer Security CS 426. CS426 Fall 2010/Lecture 40 1

Computer Security CS 426. CS426 Fall 2010/Lecture 40 1 Computer Security CS 426 Review for Final Exam CS426 Fall 2010/Lecture 40 1 Basic Concepts Confidentiality Integrity Availability Authenticity Integrity (in communications) Non-repudiation Privacy (general

More information

Hands-On UNIX Exercise:

Hands-On UNIX Exercise: Hands-On UNIX Exercise: This exercise takes you around some of the features of the shell. Even if you don't need to use them all straight away, it's very useful to be aware of them and to know how to deal

More information

Linux Driver Devices. Why, When, Which, How?

Linux Driver Devices. Why, When, Which, How? Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may

More information